Metodologi Pentest — PTES Framework
Pre-engagement Interactions
Penentuan scope, rules of engagement, NDA, legal agreement, dan komunikasi awal dengan stakeholder.
Threat Modeling
Identifikasi aset bernilai tinggi, threat actor, attack surface, dan skenario serangan prioritas.
Intelligence Gathering
Pengumpulan informasi target: OSINT, DNS enumeration, footprinting, social engineering reconnaissance.
Vulnerability Analysis
Scanning kerentanan otomatis & manual, analisis konfigurasi, review kode sumber (jika tersedia).